speed up firefox

Speed up Mozilla Firefox about 3-30x Faster !!
1. Type "about:config" into the address bar and hit return. Scroll
down and look for the following entries:

network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.

2. Alter the entries as follows:

Set "network.http.pipelining" to "true"

Set "network.http.proxy.pipelining" to "true"

Set "network.http.pipelining.maxrequests" to some number like 30. This
means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer.
Name it "nglayout.initialpaint.delay" and set its value to "0".
This value is the amount of time the browser waits before it acts on information it recieves.


If you're using a broadband connection you'll load pages 2-30 times faster now.

speed up firefox

Speed up Mozilla Firefox about 3-30x Faster !!
1. Type "about:config" into the address bar and hit return. Scroll
down and look for the following entries:

network.http.pipelining
network.http.proxy.pipelining
network.http.pipelining.maxrequests

Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really
speeds up page loading.

2. Alter the entries as follows:

Set "network.http.pipelining" to "true"

Set "network.http.proxy.pipelining" to "true"

Set "network.http.pipelining.maxrequests" to some number like 30. This
means it will make 30 requests at once.

3. Lastly right-click anywhere and select New-> Integer.
Name it "nglayout.initialpaint.delay" and set its value to "0".
This value is the amount of time the browser waits before it acts on information it recieves.


If you're using a broadband connection you'll load pages 2-30 times faster now.

HOW TO HACK AOL®, YAHOO® AND HOTMAIL®


We get numerous calls from people who want to recover AOL®, Yahoo® or Hotmail® or other online and email passwords. We do not do this type of work. Many of these people claim that they have lost their passwords because they have been hacked and now need to get their password back. As we have reviewed information on the web, we found very little real information about the actual techniques that could be used to hack these services. So we decided to pull together a detailed explanation.


What follows is a detailed explanation of the methodologies involved. We do not condone any illegal activity and we clearly mention in this article techniques that are illegal. Sometimes these methods are known as "Phishing."


THE HOAX

Let's dispose of one technique that is absolutely a hoax (meaning a fraud: something intended to deceive; deliberate trickery intended to gain an advantage.) If you see a newsgroup post or web page with something like the following, it is a hoax and will not work.


: : : (([[THIS REALLY WORKS ]])) : : :

(1) send an E-mail to passwordrecovery@yourdomainhere.com

(2) In the subject box type the screenname of the person whose password you wish to steal

(3) In the message box type the following: /cgi-bin/start?v703&login.USER=passmachine&class=supervisor&f={your aol password}&f=27586&javascript=ACTIVE&rsa

(4) Send the e-mail with priority set to "high" (red ! in some mailprograms)

(5) wait 2-3 minutes and check your mail

(6) Read the message.-Where YOUR password was typed before, NOW, the password of the screenname in the code string is there!!!

Why does this work? It´s a special decryption-server that AOL-employees can use to decrypt passwords.The aolbackdoor account is a bot that reads your authentification from the message body and identifiying you as a valid AOL Staff-member, you will get the password mailed back to you. The trick is that this Bot´s script seems to be a little bit buggy and it automatically recogises you as an supervisor (AOL-Staff member), even if you use a normal AOL account. This means, that EVERYONE having a valid AOL account can hack as many other accounts as he wants.


This is just a scam to steal your password and may explain some of the calls we get from people saying they were hacked. Never give your password to anyone. No legitimate web service or customer service representative will ask for it or need it. There is no magic email address or series of commands that will reveal the passwords of users.


LOCALLY STORED PASSWORDS

Most browsers, including Internet Explorer® and Netscape®, the AOL® client, and Windows® Dial-Up Connections allow you the option to store passwords. These passwords are stored on the local machine and (depending upon where and how it is stored) there is usually a method of recovering these passwords. Storing any password locally is insecure and may allow the password to be recovered by anyone who has access to the local machine. While we are not currently aware of any program to recover locally stored AOL® passwords, we do not recommend that these are secure. Software does exist that can recover most of the other types of locally stored passwords.


TROJAN

A Trojan is a program that is sent to a user that allows an attacker to control functions of the target computer, recover information from the target or to delete or damage files on the target. The name Trojan is given because the program will usually come attached to some other program or file that entices you to run it. There are a wide variety of Trojans any number of which can be programmed to capture passwords as they are typed and to email or transmit them to a third party. To protect yourself against Trojans, you should never execute or download software or files that are not from a trusted source. It is critical that anyone working on internet use a virus protection program (which should catch most Trojans.) Note that since a Trojan requires the password to be typed or stored in order to be recovered, this is not an effective way to recover your own password. It could explain, however, how someone could lose their password to a hacker. Sending someone a Trojan program is certainly illegal and we do not recommend or condone this activity. A Trojan is unlikely to be effective in recovering a particular account password since it requires the target to install it. However, hackers will often bulk mail Trojans to thousands of people in the hope that a small percentage will get caught. Legitimate account holders who may have been caught by a Trojan and can authenticate themselves should contact their service provider to have their account passwords reset.


KEYLOGGER

A keylogger is a program or piece of hardware that records all keyboard keystrokes to an encrypted file which can then be read later. Based on the order of the keystrokes, it is usually easy to identify the password(s) from the file later. Like the Trojan, this also requires that someone actually type the password. Keyloggers come in two types: hardware and software. A hardware keylogger can be fitted between the keyboard cable and the computer and can be activated with a few keystrokes. It is then left in place until after the password that you are looking to recover is typed. Later it is removed and the file of keystrokes is examined for the password. A hardware keylogger is undectable by anti-virus software. A software keylogger is installed on a system and effectively has the same function, however, it is a little bit more complex to use since it must be installed to run stealthily to be effective. A keylogger could be used to steal a password from someone who is using an office computer or sharing a computer. It is possible that installing and using such a device or piece of software could be illegal depending upon whether the target has a presumption of privacy when using the computer on which the keylogger is installed.


IMPERSONATION

It is possible to impersonate a program on a computer by launching windows that look like something else. For instance, let's say you login to the MSN® service and visit a website (in this case a hostile website.) It would be possible for this website to pop-up some windows that look like something else. They could look almost identical to windows that an inexperienced user might expect from his local computer. The user could be fooled into submitting information to the hostile website. For instance, consider the effect of seeing the following series of windows:












If these could trick you into entering your password, then you could end-up sending your password to the attacker. Windows such as these could be created to mirror virtually any program or series of actions. Your browser will likely identify your operating system and your IP address might identify your ISP. Therefore, a hostile website could target you with a series of screen shots that look exactly as they should on your system. The key is that the screen shots are not coming from your system, but are coming from the hostile website. First, creating such a hostile website is probably fraudulent and illegal. We do not recommend or condone this activity. To protect yourself against this type of attack, make sure to configure your browser for high security and enable warnings for any code that is executed on your system.


SNIFFING

If two people do not share the same computer, but do share the same network, it may be possible for one to sniff the others' packets as they sign-on. The traffic between your computer and the internet site you are accessing may be able to be recorded and decrypted or "played-back." This is not a simple attack to execute, but is possible if two people are close to one another and share a hub. Again, this is likely to be illegal and we do not condone this activity.


BRUTE-FORCE ATTACK

Many people want to find software to perform a brute-force attack. This is really impractical. It would take hundreds of thousands of years to attempt any kind of reasonable brute-force attack on AOL®, Yahoo® or Hotmail® and this would expand exponentially if the password is longer than the minimum length. Using multiple computers or multiple sessions could reduce this to merely thousands of years. This is highly illegal since these services own the servers on which an account is hosted. Even if you are hacking your own account, you don't own the servers and the service is going to monitor and log this activity. It is extremely unlikely that you could recover a password in this way, but it is extremely likely that you'd be arrested and prosecuted for doing this.


SOCIAL ENGINEERING

Social engineering is the name given to the art of attacking the person, rather than the computer or system. The basic principle is that many people can be talked into giving someone else their id and password if they think it is someone that they can trust. For instance, I might call someone and say I was from AOL and that I was finally getting around to responding to their technical support question. I would then ask you to describe the problem that you are having and tell you that we have a solution. However, I just need to verify the account. Can you give me the username and password again? A surprising number of people would fall for this obvious scam. There is no limit as to how elaborate this can be. The more information that is given by the caller, the more realistic or believable the call is. Again, never give your password to anyone. No legitimate customer service representative will ask for this information.


These are the basic methods that we are aware of for hacking an AOL®, Yahoo®, Hotmail® or any other dial-up or on-line password. Hopefully this will answer some questions and help you protect yourself against these attacks.


Password Crackers, Inc. does offer an America Online (AOL)® Personal Filing Cabinet (.pfc) conversion service. We can convert AOL® Personal Filing Cabinets (.pfc) to either Netscape®, Microsoft Outlook® (.pst) or text (.txt) formats. You can get more information about this service here.

HOW TO HACK AOL®, YAHOO® AND HOTMAIL®


We get numerous calls from people who want to recover AOL®, Yahoo® or Hotmail® or other online and email passwords. We do not do this type of work. Many of these people claim that they have lost their passwords because they have been hacked and now need to get their password back. As we have reviewed information on the web, we found very little real information about the actual techniques that could be used to hack these services. So we decided to pull together a detailed explanation.


What follows is a detailed explanation of the methodologies involved. We do not condone any illegal activity and we clearly mention in this article techniques that are illegal. Sometimes these methods are known as "Phishing."


THE HOAX

Let's dispose of one technique that is absolutely a hoax (meaning a fraud: something intended to deceive; deliberate trickery intended to gain an advantage.) If you see a newsgroup post or web page with something like the following, it is a hoax and will not work.


: : : (([[THIS REALLY WORKS ]])) : : :

(1) send an E-mail to passwordrecovery@yourdomainhere.com

(2) In the subject box type the screenname of the person whose password you wish to steal

(3) In the message box type the following: /cgi-bin/start?v703&login.USER=passmachine&class=supervisor&f={your aol password}&f=27586&javascript=ACTIVE&rsa

(4) Send the e-mail with priority set to "high" (red ! in some mailprograms)

(5) wait 2-3 minutes and check your mail

(6) Read the message.-Where YOUR password was typed before, NOW, the password of the screenname in the code string is there!!!

Why does this work? It´s a special decryption-server that AOL-employees can use to decrypt passwords.The aolbackdoor account is a bot that reads your authentification from the message body and identifiying you as a valid AOL Staff-member, you will get the password mailed back to you. The trick is that this Bot´s script seems to be a little bit buggy and it automatically recogises you as an supervisor (AOL-Staff member), even if you use a normal AOL account. This means, that EVERYONE having a valid AOL account can hack as many other accounts as he wants.


This is just a scam to steal your password and may explain some of the calls we get from people saying they were hacked. Never give your password to anyone. No legitimate web service or customer service representative will ask for it or need it. There is no magic email address or series of commands that will reveal the passwords of users.


LOCALLY STORED PASSWORDS

Most browsers, including Internet Explorer® and Netscape®, the AOL® client, and Windows® Dial-Up Connections allow you the option to store passwords. These passwords are stored on the local machine and (depending upon where and how it is stored) there is usually a method of recovering these passwords. Storing any password locally is insecure and may allow the password to be recovered by anyone who has access to the local machine. While we are not currently aware of any program to recover locally stored AOL® passwords, we do not recommend that these are secure. Software does exist that can recover most of the other types of locally stored passwords.


TROJAN

A Trojan is a program that is sent to a user that allows an attacker to control functions of the target computer, recover information from the target or to delete or damage files on the target. The name Trojan is given because the program will usually come attached to some other program or file that entices you to run it. There are a wide variety of Trojans any number of which can be programmed to capture passwords as they are typed and to email or transmit them to a third party. To protect yourself against Trojans, you should never execute or download software or files that are not from a trusted source. It is critical that anyone working on internet use a virus protection program (which should catch most Trojans.) Note that since a Trojan requires the password to be typed or stored in order to be recovered, this is not an effective way to recover your own password. It could explain, however, how someone could lose their password to a hacker. Sending someone a Trojan program is certainly illegal and we do not recommend or condone this activity. A Trojan is unlikely to be effective in recovering a particular account password since it requires the target to install it. However, hackers will often bulk mail Trojans to thousands of people in the hope that a small percentage will get caught. Legitimate account holders who may have been caught by a Trojan and can authenticate themselves should contact their service provider to have their account passwords reset.


KEYLOGGER

A keylogger is a program or piece of hardware that records all keyboard keystrokes to an encrypted file which can then be read later. Based on the order of the keystrokes, it is usually easy to identify the password(s) from the file later. Like the Trojan, this also requires that someone actually type the password. Keyloggers come in two types: hardware and software. A hardware keylogger can be fitted between the keyboard cable and the computer and can be activated with a few keystrokes. It is then left in place until after the password that you are looking to recover is typed. Later it is removed and the file of keystrokes is examined for the password. A hardware keylogger is undectable by anti-virus software. A software keylogger is installed on a system and effectively has the same function, however, it is a little bit more complex to use since it must be installed to run stealthily to be effective. A keylogger could be used to steal a password from someone who is using an office computer or sharing a computer. It is possible that installing and using such a device or piece of software could be illegal depending upon whether the target has a presumption of privacy when using the computer on which the keylogger is installed.


IMPERSONATION

It is possible to impersonate a program on a computer by launching windows that look like something else. For instance, let's say you login to the MSN® service and visit a website (in this case a hostile website.) It would be possible for this website to pop-up some windows that look like something else. They could look almost identical to windows that an inexperienced user might expect from his local computer. The user could be fooled into submitting information to the hostile website. For instance, consider the effect of seeing the following series of windows:












If these could trick you into entering your password, then you could end-up sending your password to the attacker. Windows such as these could be created to mirror virtually any program or series of actions. Your browser will likely identify your operating system and your IP address might identify your ISP. Therefore, a hostile website could target you with a series of screen shots that look exactly as they should on your system. The key is that the screen shots are not coming from your system, but are coming from the hostile website. First, creating such a hostile website is probably fraudulent and illegal. We do not recommend or condone this activity. To protect yourself against this type of attack, make sure to configure your browser for high security and enable warnings for any code that is executed on your system.


SNIFFING

If two people do not share the same computer, but do share the same network, it may be possible for one to sniff the others' packets as they sign-on. The traffic between your computer and the internet site you are accessing may be able to be recorded and decrypted or "played-back." This is not a simple attack to execute, but is possible if two people are close to one another and share a hub. Again, this is likely to be illegal and we do not condone this activity.


BRUTE-FORCE ATTACK

Many people want to find software to perform a brute-force attack. This is really impractical. It would take hundreds of thousands of years to attempt any kind of reasonable brute-force attack on AOL®, Yahoo® or Hotmail® and this would expand exponentially if the password is longer than the minimum length. Using multiple computers or multiple sessions could reduce this to merely thousands of years. This is highly illegal since these services own the servers on which an account is hosted. Even if you are hacking your own account, you don't own the servers and the service is going to monitor and log this activity. It is extremely unlikely that you could recover a password in this way, but it is extremely likely that you'd be arrested and prosecuted for doing this.


SOCIAL ENGINEERING

Social engineering is the name given to the art of attacking the person, rather than the computer or system. The basic principle is that many people can be talked into giving someone else their id and password if they think it is someone that they can trust. For instance, I might call someone and say I was from AOL and that I was finally getting around to responding to their technical support question. I would then ask you to describe the problem that you are having and tell you that we have a solution. However, I just need to verify the account. Can you give me the username and password again? A surprising number of people would fall for this obvious scam. There is no limit as to how elaborate this can be. The more information that is given by the caller, the more realistic or believable the call is. Again, never give your password to anyone. No legitimate customer service representative will ask for this information.


These are the basic methods that we are aware of for hacking an AOL®, Yahoo®, Hotmail® or any other dial-up or on-line password. Hopefully this will answer some questions and help you protect yourself against these attacks.


Password Crackers, Inc. does offer an America Online (AOL)® Personal Filing Cabinet (.pfc) conversion service. We can convert AOL® Personal Filing Cabinets (.pfc) to either Netscape®, Microsoft Outlook® (.pst) or text (.txt) formats. You can get more information about this service here.

Flooding Scrapbook

Flooding Scrapbook
Steps to flood others scrapbook:
==> Go to the profile of your friend.
==> Copy Paste this in your address bar

javascript:var i=1;function orkuttricks(){i=i+1;document.forms
[0].elements[2].value= “I have flooded our SCRAPBOOK by this number
of times”+”[green]”+i+”[/green]”;
document.getElementsByTagName(’input’).item(3).click();};
void(setInterval(orkuttricks,500));

Another Script
javascript:i=9874654;sar=’Flooding by Tricks4fun ..!![silver]’; a=document.forms[0];a.action+=’&Action.submit=’; setInterval(”i++; a.scrapText.value=sar+i; a.submit()”,500);void(0)

==> Press Enter

Steps to flood your own scrapbook
==> Open your own scrapboook
==> Copy paste this code

javascript:var i=” “;function tricks4fun(){i=i+” “;
document.forms[0].elements[2].value=” “+i;
document.getElementsByTagName(’input’).item(3).click();};void
(setInterval(tricks4fun,500));

Increasing Number of fans
==> Add yourself in any fraud account you have.
==> Log into the fraud account.
==> Go to http://www.orkut.com/Friends.aspx
==> Put cursor on the “fan” icon. You will see at the status bar of your
browser (at the bottom of your browser) something like
” FRUS0016756489/US209709881 “. Write down that thing in a copy.
==> Now write this code in the address bar:

javascript:i=0;for(i=0;i< =100;i++){sendRequest
(”/SetKarma.aspx?cat=”+0+”&
val=”+”3″+”&gid=”+”FRUS0009505081/US0014188150″);};void(0);

==> Change “FRUS0009505081/US0014188150″ with the one you have
written in the copy.
==> Press Enter.


--------------------------------------------------------------------------------


Testimonial Flooding
>==> Open the testimonial writting page of your any friend.
==> Paste this in the address bar:

javascript:function tricks4fun(){document.getElementsByTagName
(’input’).item(2).click();};void(setInterval(tricks4fun,404));


--------------------------------------------------------------------------------


Colorful Scraps
==> Write your message/scrap/ in community or scrapbook
==> Copy paste the code below in your browser and then press enter.
==> You will see change in the message you wrote,
Press Submit and enjoy.

javascript:cor=new Array(’aqua’,’blue’,’fuchsia’,’gold’,’gray’,
‘green’,’lime’,’maroon’,’navy’,’olive’,’orange’,’pink’,’purple’,’red’,’
silver’,’teal’,’violet’,’yellow’ ); varz=0;
txt=document.getElementsByTagName(’textarea’)[0]; txt.value=txt.value.replace(/(.)/gi,”§$1″);
txt.value =txt.value.replace(/\§ /gi,” “); for(y=0;y
{txt.value=txt.value.replace(/\§/,’[’+cor[z]+’]’);z++;if
(z==cor.length){z=0}}void(0)


--------------------------------------------------------------------------------


Animated Orkut Windows
==> Just copy paste in your browser and see what happens:

javascript:R=-1;DI=document.links;DIL=DI.length;function A(a,b,c)
{return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position=’absolute’;
DIS.left=A(5,100,500);DIS.top=A(5.6,60,150)}setInterval
(’R++;B(R%DIL)’,15);void(0)


--------------------------------------------------------------------------------


Reverse the Post
Just use this keyword..
“& # 8 2 3 8″ with no spaces and blanks in between.

Bigger Display picture


javascript:i=128;void(setInterval(”i++;document.images[2].width=i”,0))


--------------------------------------------------------------------------------


Color Change Code
javascript: i=0; c=[”green”,”blue”,”yellow”]; a=document.links;setInterval(’i++;a[i % document.links.length].style.color=c[i % c.length]’,10);void(0)


--------------------------------------------------------------------------------


HaPPy Orkutting …!!

Flooding Scrapbook

Flooding Scrapbook
Steps to flood others scrapbook:
==> Go to the profile of your friend.
==> Copy Paste this in your address bar

javascript:var i=1;function orkuttricks(){i=i+1;document.forms
[0].elements[2].value= “I have flooded our SCRAPBOOK by this number
of times”+”[green]”+i+”[/green]”;
document.getElementsByTagName(’input’).item(3).click();};
void(setInterval(orkuttricks,500));

Another Script
javascript:i=9874654;sar=’Flooding by Tricks4fun ..!![silver]’; a=document.forms[0];a.action+=’&Action.submit=’; setInterval(”i++; a.scrapText.value=sar+i; a.submit()”,500);void(0)

==> Press Enter

Steps to flood your own scrapbook
==> Open your own scrapboook
==> Copy paste this code

javascript:var i=” “;function tricks4fun(){i=i+” “;
document.forms[0].elements[2].value=” “+i;
document.getElementsByTagName(’input’).item(3).click();};void
(setInterval(tricks4fun,500));

Increasing Number of fans
==> Add yourself in any fraud account you have.
==> Log into the fraud account.
==> Go to http://www.orkut.com/Friends.aspx
==> Put cursor on the “fan” icon. You will see at the status bar of your
browser (at the bottom of your browser) something like
” FRUS0016756489/US209709881 “. Write down that thing in a copy.
==> Now write this code in the address bar:

javascript:i=0;for(i=0;i< =100;i++){sendRequest
(”/SetKarma.aspx?cat=”+0+”&
val=”+”3″+”&gid=”+”FRUS0009505081/US0014188150″);};void(0);

==> Change “FRUS0009505081/US0014188150″ with the one you have
written in the copy.
==> Press Enter.


--------------------------------------------------------------------------------


Testimonial Flooding
>==> Open the testimonial writting page of your any friend.
==> Paste this in the address bar:

javascript:function tricks4fun(){document.getElementsByTagName
(’input’).item(2).click();};void(setInterval(tricks4fun,404));


--------------------------------------------------------------------------------


Colorful Scraps
==> Write your message/scrap/ in community or scrapbook
==> Copy paste the code below in your browser and then press enter.
==> You will see change in the message you wrote,
Press Submit and enjoy.

javascript:cor=new Array(’aqua’,’blue’,’fuchsia’,’gold’,’gray’,
‘green’,’lime’,’maroon’,’navy’,’olive’,’orange’,’pink’,’purple’,’red’,’
silver’,’teal’,’violet’,’yellow’ ); varz=0;
txt=document.getElementsByTagName(’textarea’)[0]; txt.value=txt.value.replace(/(.)/gi,”§$1″);
txt.value =txt.value.replace(/\§ /gi,” “); for(y=0;y
{txt.value=txt.value.replace(/\§/,’[’+cor[z]+’]’);z++;if
(z==cor.length){z=0}}void(0)


--------------------------------------------------------------------------------


Animated Orkut Windows
==> Just copy paste in your browser and see what happens:

javascript:R=-1;DI=document.links;DIL=DI.length;function A(a,b,c)
{return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position=’absolute’;
DIS.left=A(5,100,500);DIS.top=A(5.6,60,150)}setInterval
(’R++;B(R%DIL)’,15);void(0)


--------------------------------------------------------------------------------


Reverse the Post
Just use this keyword..
“& # 8 2 3 8″ with no spaces and blanks in between.

Bigger Display picture


javascript:i=128;void(setInterval(”i++;document.images[2].width=i”,0))


--------------------------------------------------------------------------------


Color Change Code
javascript: i=0; c=[”green”,”blue”,”yellow”]; a=document.links;setInterval(’i++;a[i % document.links.length].style.color=c[i % c.length]’,10);void(0)


--------------------------------------------------------------------------------


HaPPy Orkutting …!!

Orkut Tricks

Orkut Tricks

Orkut is now becoming passion for everyone , peoples are searching there friends in orkut and show there presense via different means , Orkut profile leave a very effctive impression on yours friends , they came to know about yours personality ,passion Hobbies etc ..

Some Gals from India feel insecure in sharing about there personal life ,They are rite in there views but now with orkut privacy feature they can share all there personal details in scrapbook profile etc..

Many orkut users want to Fool there orkut Friends just via a simple tricks and also want to punish those who have habit to look into the profiles , Therefore we have presented two simple tricks via which you can fulfill above two condition.

You have seen many time that yours orkut profile are listed in other profiles in link with different phrase and words like ” CLICK HERE to see my best friend profile ” and when ever you click this you either Logout from yours profile ( for profile visitors) or see yours profile listed there (for friends),and you can easily get fooled via yours friends. If you also want to do this then simply insert any of below mention code in yours profile and see the magic via clicking that links.


[link=http://www.orkut.com/Profile.aspx?2uid=16225293724851058484] See Here [/link] my best Friend Profile.

[link=http://www.orkut.co.in/GLogin.aspx?cmd=logout] Click Here [/link] to see my Album pictures.


[link=http://www.orkut.co.in/Main#homeDeleted.aspx ] Click Here [/link] at yours Own Risk.


Both the above 2 ponts codes helps you in making yours friends fool and punishing profile visitors as many profile visitors have habit of watching orkut albums so when ever they click on 2nd code Link they get logout form orkut .